Friday, December 10, 2010
Idiots Abound
Let me give you a hint, folks. Linux isn't any more secure. Neither is Mac. They're just more obscure. The reason Microsoft is so susceptible to virus attacks is because almost all of the virus-writers deploy their code specifically to attack Microsoft software. Why? Because it's the most popular.
Whenever I hear someone complain about how they won't use Microsoft technology because it's not secure I just roll my eyes. Complaining about the lack of security in Microsoft products is like complaining that a wool sweater is itchy.
Thursday, December 09, 2010
Sunday, August 30, 2009
They ARE Watching You
"One of the recommendations of the National Criminal Intelligence Sharing Plan is that every law enforcement agency, regardless of size, should develop an intelligence capacity."
This document was written by Professor David Carter at the School of Criminal Justice, Michigan State University.
It discusses methods of gathering intelligence in the communities they serve for all branches of local law enforcement, as well as advising on the new concept of "intelligence fusion" which is the sharing of intelligence gathered on civilians by local law enforcement. It discusses the risks of trespassing on a citizen's civil rights and how to mitigate those risks while still gathering and maintaining effective intel.
It discusses methods of intelligence gathering such as dumpster diving, informant information, banking transactions, wiretaps, and CCTV videos and how to link all those different sources of intel into "actionable intelligence".
Never before has the American citizen been under such scrutiny by his government. Never before has a government had so many tools at its disposal to monitor, track, and isolate potential dissenters.
http://cryptome.org/le-spy-guide.zip
Wednesday, August 05, 2009
The Coup d'Etat
However there were all the other hallmarks of a coup d'etat. First, they subverted the courts to provide justification of the takeover. Next, they seized control of the banks and money supply. They nationalized various industries and businesses.
This is a very scary time. Now more than ever before this blog has a purpose. Prepare for more information.
Saturday, August 16, 2008
Hiding in the System
You are an individual in the system. The system is composed of all the interlinked networks. That's the cash registers where you buy your corn flakes, to the camera outside the bank, to the GPS signal on your cellphone, to the electric bill that comes to your door. It encompasses anything and everything about your daily life.
Once the administrators of the system, i.e. the government, determine that you are a person of interest they will begin mining the system in an attempt to find out any misdeeds of yours or to determine future behavior, or simply to locate you for arrest.
Your problem is that there is vast array of information being collected about you as an individual and it is all available to law enforcement. However, law enforcement's problem is that there is a vast array of information being collected about ALL individuals and sorting you out of the mix becomes difficult.
The purpose of any privacy enhancing techniques or tools is to decrease your "signature" in the system and make sorting you out that much MORE difficult. Because multimodal mining methods are in use, you've got to use multimodal techniques. In order words, you've got to consider that they are watching your credit card records and comparing them against the records at Costco where you just bought a bulk order of beans. Then they go see that you've also bought a large stockpile of 8mm ammunition suited to fit a Mauser rifle and your library records show that you've recently checked out a series of anti-government books detailing Ruby Ridge and Waco. DING! You fit a profile and have become a person of interest. That's multimodal intrusion. To use multimodal avoidance techniques you would need to have remained anonymous at Costco, the gunshop, AND the library. Perhaps that wouldn't have been feasible at all three locations, but perhaps just one or two of them would have kept you off of the FBI's radar.
If you make it a goal to DAILY decrease your signature then you become lost in the noise. They will have to be specifically looking for you and it will be that much more difficult to sort you out of the background. At best they can only get you at the legal chokepoints they have created. (An example of a legal chokepoint would be having to show a valid driver's license in order to purchase ammunition. That's why I'm an advocate of reloading your own ammo. They may know that you made a purchase at some point in time, but not a recent one and older records are harder to sort through than newer ones.)
So keep these things in mind next time you go out into the world. Be aware of the cameras watching you. Be aware of the tollbooths you pass through with their automatic transponders. Be aware of the credit card transactions you are making or the library requests you are placing. You may not have anything to hide, but that's no reason to let people snoop through your business.
Time To Wake Up
http://www.msnbc.msn.com/id/26231181/
Since I started this blog, things have gotten worse. The Bush Administration has come closer and closer to totalitarianism and set the state well for a future fascist like Obama to come in and seize control of the populace. I don’t know how I feel about coming in and publishing more information on how to defeat the systems. It may set me up as a target for future gulag. I have a family. However I must do something.
Sunday, October 22, 2006
DIME Weaponry
Israel is alleged to have used this against Hezbollah in Gaza. The United States has supposedly been using it in Iraq for some time now. A complex explosive warhead which can go through walls and kill an individual without harming a child across the room is an extremely marketable weapon.
It won't be long before it finds its way into the hands of law enforcement in the United States, just like night vision, stun guns, teflon-coated bullets, and flash bangs.
The problems with these weapons? The warheads disintegrate into a cloud of tungsten microfibers, known to cause cancer inside the human body. The microfibers are still going to penetrate the skin of anyone around, either through the explosion itself or through breathing or touching the dust. Once inside, they rapidly create cancer sites, as fast as depleted uranium. And because these fibers are microscopic, you can't get them out with surgery. Being caught near a blast, or passing where a blast has occurred within several years is a death sentence. It won't kill you right there while the cameras are rolling, or leave a body for the propaganda machine to hold up, but you'll die just the same in a few years.
Our soldiers are being exposed to it now. You may be exposed to it in a few years. Remember this post when you start hearing about it in the local news.
Monday, October 16, 2006
Defeating Face Recognition
Cameras are part of one of Darpa's old projects .. HID technology, or "HumanId at a Distance". They advocate that it's used to pick known terrorists out of crowds in public spaces, but it's undoubtedly being used for more than that in our America of secret prisons and CIA-sponsored murders of American citizens.
Now keep in mind that most facial recognition systems require a reference photo to be cross-checked when the system scans your face. This would be something like a driver's license, credit card photo, or national ID photo. The technology basically renders your face into a computerized image of mapped "points" such as the dimensions of your chin, eyes, nose, etc. Then it translates those to numbers and does a quick search of all the numbers in its database (mapped to reference photos). It comes up with probability hits as to who you might be. It's suprisingly accurate when all the conditions are right (fresh photos, good lighting, etc.)
Methods for Foiling
Knowing now how it works, your next step is to use this knowledge to prevent it from reading your mapped points correctly.
1. Physically altering your appearance - This doesn't have to mean a big rubber Nixon mask. It can be as simple as mirrored sunglasses, wrapping a scarf around your face in cold weather, a bandage on the face, etc. These are relatively innocuous and won't attract a lot of attention. Additional countermeasures include wearing a mask or painting your face with stripes, but these I rule out as impractical when you're trying to avoid calling attention to yourself.
2. Altering the lighting - If the camera position is known, stay in shadow or turn your face away from it. Carry a cigarette or a cellphone and inconspicuously cover your face with your hand. A flashlight shined either at the camera or used to backlight your face also works, but will attract attention.
3. Good Prepartion - Many distinguishing marks occur in the reference photos and make it so that it's almost impossible to conceal your identity later on. Eyeglasses and facial hair play a prominent part in this. When posing for government photos, make sure you look as different in them as possible.
Some individuals have such a unique face that they simply are not able to avoid detection. Being alert to the presence of cameras and avoiding those locations is easy today, but will not be so by 2016 when almost all of the major cities are camera-promiscuous. In those situations it is necessary to inject as much noise in the system as possible. Move in large crowds, concealing yourself where possible behind other individuals. Use the landscape to your advantage. Don't walk through the normal 'channels' where public traffic is herded; instead take alternate routes in and out of public spaces.
Remember: Whether or not you use these methods today is up to you, but as a citizen it is your duty to know them. Our government is conceivably less benign today than it was in earlier years and is likely to continue its downhill slide under either party. Prepare for the future.